3442 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION On the Physical Layer Security of Backscatter Wireless Systems Walid Saad, Xiangyun Zhou, Zhu Han, and H. Vincent Poor Abstract—Backscatter wireless communication lies at the heart of many practical low-cost, low-power, distributed passive sensing systems. The inherent cost restrictions coupled with the modest computational and storage capabilities of passive sensors, such as RFID tags, render the adoption of classical security techniques challenging; which motivates the introduction of physical layer security approaches. Despite their promising potential, little has been done to study the prospective benefits of such physical layer techniques in backscatter systems. In this paper, the physical layer security of wireless backscatter systems is studied and analyzed. First, the secrecy rate of a basic single-reader, singletag model is studied. Then, the unique features of the backscatter channel are exploited to maximize this secrecy rate. In particular, the proposed approach allows a backscatter system’s reader to inject a noise-like signal, added to the conventional continuous wave signal, in order to interfere with an eavesdropper’s reception of the tag’s information signal. The benefits of this approach are studied for a variety of scenarios while assessing the impact of key factors, such as antenna gains and location of the eavesdropper, on the overall secrecy of the backscatter transmission. Numerical results corroborate our analytical insights and show that, if properly deployed, the injection of artificial noise yields significant performance gains in terms of improving the secrecy of backscatter wireless transmission. Index Terms—Secrecy rate, backscatter communication, artificial noise, physical layer security. I. I NTRODUCTION ACKSCATTER systems constitute a class of wireless communication networks in which a transceiver, often known as an interrogator or reader, communicates with and powers up neighboring resource-constrained nodes, known as tags, so as to extract useful data. Each tag is an inexpensive, passive (or semi-passive) sensor-like node that contains information (identification data or sensor measurements) that the reader seeks to acquire. Such passive tags do not have their own transmission circuitry, instead, each tag backscatters its information by appending it to the received reader’s signal. Thus, the key characteristics of such a backscatter system B Manuscript received March 18, 2013; revised August 26, 2013 and January 8, 2014; accepted March 4, 2014. The associate editor coordinating the review of this paper and approving it for publication was J. Wallace. W Saad is with the Electrical and Computer Engineering Department, University of Miami, Coral Gables, FL, USA (e-mail: [email protected]). X. Zhou is with the Research School of Engineering, Australian National University, Australia (e-mail: [email protected]). Z. Han is with the ECE Department, University of Houston, Houston, TX, USA (e-mail: [email protected]). H. V. Poor is with the Electrical Engineering Department, Princeton University, Princeton, NJ, USA (e-mail: [email protected]). This research was supported in part by the National Science Foundation under Grants CNS-1265268, CNS-1117560, ECCS-1028782, and CNS0953377, and in part by the Qatar National Research Foundation. A preliminary version of this work was presented as an invited paper at the Ninth International Symposium on Wireless Communication Systems (ISWCS), Paris, France [43]. Digital Object Identifier 10.1109/TWC.2014.051414.130478 include the reliance of the tag on the reader’s transmitted signal in order to power up and transmit its data as well as the ability of the reader to act as a transmitter, receiver, and source of power for the tag. Backscatter systems comprise an emerging wireless technology that has become very popular in many practical systems such as distributed passive sensor networks and radio frequency identification (RFID) systems [1]–[10]. In fact, backscatter communication constitutes the backbone of practical RFID systems that enable the interconnection of physical objects through the use of small, inexpensive chips, i.e., RFID tags, which are remotely powered by a wireless RFID reader [2]. In fact, it is envisioned that, with a proper design of the underlying backscatter communication system, state-of-the-art ultra high frequency (UHF) RFID systems will lie at the heart of future cyberphysical systems such as the Internet of things [2]. In order to reap the benefits of backscatter-based communication systems, a variety of technical challenges must be addressed at different levels ranging from the circuit design of tags to advanced backscatter signal processing [1]–[11]. In [2] and [5], the authors discuss various large-scale applications of RFID systems, particularly in sensor networks, that highlight the need for new techniques to secure and optimize RFID systems. The works in [3], [7], and [10] provide the much needed signal processing basis for studying single and multiple antenna backscatter systems, under various radio conditions. The standardization and practical issues pertaining to RFID security are discussed in [4], from a market perspective. Various issues pertaining to the design of RFID tags and their associated load/throughput are studied in [6], [8], and [9]. Finally, the work in [11] discusses collision avoidance protocols that allow readers to communicate with multiple tags. Beyond the aforementioned technical challenges, securing backscatter communication systems constitutes a key design issue due to the fact that malicious attacks, such as eavesdropping, can lead not only to data interception but also to serious privacy breaches such as owner tracking or identity modification, among others [12]. These breaches are a direct consequence of the ubiquitous nature of backscatter systems in which the tags can be appended to practically every physical object ranging from retail products to transportation systems, and even body area networks. The challenges of securing backscatter-based systems stem from the practical limitations, in terms of cost, size, and computation, which motivate novel approaches to wireless security [13], [14]. In the existing literature, most security solutions tailored toward backscatter communication are based on concepts from the field of lightweight cryptography – a scaled-down c 2014 IEEE 1536-1276/14$31.00 SAAD et al.: ON THE PHYSICAL LAYER SECURITY OF BACKSCATTER WIRELESS SYSTEMS version of standard cryptography, such as in [15]–[19] (and references therein). While these approaches provide a good level of security against a number of attacks, they do exhibit important limitations [14], [20]–[22] such as the reliance on key generation, which requires a reasonable amount of computation and storage on the sensor tags and the need for exchange of cryptographic credentials over the backscatter wireless channel, which increases overhead and can still be received by an eavesdropper, even if encrypted. Beyond lightweight cryptographic approaches, some recent works such as in [22], study the feasibility of implementing basic cryptographic schemes such as the RC5 algorithm on resourceconstrained tags. However, the results in [22] show that such an implementation is possible only at very short ranges (e.g., 0.75 meters) and by using prototype tags that possess higher storage and computational power, compared to commercial tags such as those following the electric product code (EPC) global standard [23]. One promising direction to overcome some of the limitations of cryptography in backscatter systems is to develop physical layer (PHY) security mechanisms which exploit wireless channel characteristics such as noise, traditionally seen as impediments, for defending wireless transmission against eavesdropping, without the reliance on secret key exchange or generation [24]. PHY security techniques can be used as either an alternative to cryptography or as a complement that can strengthen existing cryptographic techniques by providing a secure transmission channel for key distribution and exchange. Significant research efforts towards developing PHY security mechanisms for standard wireless networks have been recently conducted [24]–[35]. The pioneering work of Wyner in [24] is among the first to suggest the use of the wireless channel characteristics as a means for securing wireless transmission. In [25]–[29], the authors discuss the key parameters involved in the characterization of the secrecy capacity of a variety of wireless channels and provide the needed theoretical tools to study secrecy in a wireless system. The works in [30]–[32] study the use of relaying as a means to optimize secrecy rates in wireless systems while [33] proposes a practical approach to benefit from physical layer security with little information on the eavesdroppers. Other mobile network applications of physical layer security are studied in [34] and [35]. However, all of these existing works are oriented toward traditional cellular-like systems and thus cannot be directly used in a backscatter communication setting. Remarkably, despite the fact that backscatter systems constitute an ideal setting for deploying PHY security mechanisms, little work has been done to study its feasibility and potential as we propose in this paper. The main contribution of this paper is to study and analyze the physical layer security of a wireless system that employs backscatter communication. To this end, we study the characteristics and properties of the secrecy rate of a backscatter communication system, given the two key features of the backscatter channel: (i)- the nature of the backscatter channel in which the signal transmitted by the reader is modulated and relayed back by the tag to the reader; and (ii)- the presence of a signal continuously transmitted by the reader for powering the tag during communication. Then, we propose an approach to exploit these two features so as to optimize the 3443 overall secrecy. In particular, we develop a scheme in which a reader is able to inject a randomly generated noise signal that is added to the conventional continuous wave signal, in order to interfere with the eavesdropper’s reception of the tag’s backscatter information signal. While this idea of noise injection has been used in the physical layer security literature that deals with conventional cellular systems such as in [32], [36]–[40], its application to wireless backscatter systems is novel. We show that, in order to benefit from the proposed approach, the reader must optimize the allocation of its limited transmit power between its continuous wave and the noise signal. Within the scope of this paper, we focus our attention on the baseline case of a single reader, single tag model. For this model, we analytically derive various results that provide key insights on how and when perfect secrecy can be achieved using the proposed approach. In particular, we study the impact of key factors, such as antenna gains and location of the eavesdropper, on the overall secrecy of the backscatter transmission. Then, we propose an optimization approach that enables the reader to intelligently determine the amount of power that must be allocated to the artificial noise so as to maximize the overall secrecy of the link. Using various numerical results, we evaluate the performance of the proposed approach and show that the injection of artificial noise yields significant performance gains in terms of improving the secrecy of backscatter transmission. The rest of this paper is organized as follows: Section II presents the system model for the single reader case. In Section III, we present the proposed approach for improving backscatter secrecy and develop the analysis. In Section IV, we analyze the conditions required for achieving positive secrecy. The proposed approach for optimal power allocation is presented and analyzed in Section V. Finally, conclusions are drawn in Section VI. II. S YSTEM M ODEL Consider a backscatter communication system consisting of a single reader and an associated tag. Hereinafter, we will adopt the terms “tag” and “reader” commonly used in RFID systems. However, the analysis and results in the sequel are not limited to RFID systems, but are also applicable to a broad range of backscatter communication systems (e.g., passive sensor networks). The tag holds information (e.g., identification or sensor data) that needs to be sent to the reader. Here, as is typical in backscatter systems, we consider that the tag is passive (or semi-passive where the battery is used as backup power, but not used for transmission), and hence, cannot initiate transmissions on its own [1]. In order to power up the tag, the reader transmits a standardized continuous wave (CW) carrier signal. This signal induces an RF voltage across the tag antenna which is used to power the tag. Subsequently, the tag transmits back its stored information by controlling the amount of backscatter of the impinging CW carrier signal. In other words, the tag does not generate its own signal, but rather appends its information by modulating the carrier signal sent from the reader which is subsequently echoed back to the reader. This communication model is known as a backscatter communication [1]. During this backscatter, the reader continuously transmits the CW carrier signal to power the tag circuit while at the same time receiving the echoed 3444 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION signal containing the tag’s information, i.e., operating in fullduplex mode. In this work, we assume that the reader is able to perfectly separate its received signal from the transmitted signal without any signal leakage1 . Considering the discrete-time signal model in the baseband, the received signal at the reader is given by [1], [41]: yR = hT R hRT xs + nR + hT R nT , (1) where x is the signal transmitted by the reader, s is the tag’s information signal, hT R and hRT are, respectively, the tagreader and reader-tag channel gains (with the antenna gains taken into account), nR is additive white Gaussian noise 2 , and nT is AWGN (AWGN) at the reader with power σR at the tag which is backscattered to the reader with power σT2 . The power of the signal transmitted by the reader is denoted by Px . The fraction of the received power reflected back in the tag’s useful information signal is Γ. Note that Γ < 1 due to the passive nature of the tag [1]. While many channel models exist for backscatter wireless systems, here, we use the Friis equation to model the power loss of signal propagation, which is commonly adopted for communication over a short distance [1], [7]. In this context, for the reader with a transmit power of Px , the received power following the backscatter is given by PRrx = Px ΓG2RT K 2 d−4 RT , (2) where GRT represents the combined transmitter-receiver antenna gain of the reader-tag link, dRT is the distance between the reader and the tag, and K = (λ/4π)2 is a constant dependent on the carrier wavelength λ. Therefore, we can define the signal-to-noise ratio (SNR) at the reader as Px ΓG2RT K 2 d−4 RT . γR = 2 σR + σT2 GRT Kd−2 RT (3) A. Backscatter Physical Layer Security One of the most challenging tasks in backscatter systems, such as RFIDs, is the ability to secure the transmission against eavesdropping [1], [12], [13] when confidential information needs to be sent from the tag to the reader. Unlike the traditional cryptographic approach, in this work, we explore the potential of incorporating physical layer security techniques for confidential message transmission from the tag to the reader in the presence of an eavesdropper. Figure 1 shows an illustrative example of such a backscatter communication model. Similar to the received signal model for the reader, the received signal at the eavesdropper is: yE = hT E hRT xs + nE + hT E nT E , (4) where hT E is the tag-eavesdropper channel gain (with the antenna gains taken into account), nE is AWGN at the eaves2 , and nT E is the AWGN backscattered dropper with power σE from the tag to the eavesdropper with power σT2 E . Note 1 The assumption of perfect signal separation is commonly used in most existing literature of backscatter communication systems [1], [3], [7], [8]. Note that the difficulty of signal separation at the reader increases as the transmitted signal deviates from a pure CW carrier signal in which case a more advanced transceiver is required to keep the signal leakage at a minimal level as discussed in [41]. In this work, we assume a good transceiver design at the reader and hence the signal leakage is not considered in our analysis. Fig. 1. An illustrative example of the proposed wireless backscatter model in single reader case. that during the reception of the backscatter signal from the tag, the reader is also transmitting its CW signal which is received by the eavesdropper as well. Thus, the eavesdropper receives the superposition of the CW signal from the reader and the backscattered signal from the tag, because the signals are transmitted continuously. We assume that, in normal backscatter systems, the standardized CW signal is known to the eavesdropper, and hence, can be easily removed from the received signal. This is why this signal term does not appear in (4). Again using the Friis equation to model the power loss due to signal propagation, the SNR at the eavesdropper is obtained as [1]: −2 Px ΓK 2 GRT GT E d−2 RT dT E , (5) γE = −2 2 + σ2 G σE T E T E KdT E where GT E represents the combined transmitter-receiver antenna gain of the tag-eavesdropper link, and dT E is the distance between the eavesdropper and the tag. The performance limits of physical layer security are often characterized by the maximum secrecy rate achievable for a given secure transmission scheme. This metric gives the maximum rate at which the transmission of confidential information can be decoded by the legitimate receiver with arbitrarily small error while perfect secrecy against the eavesdropper is maintained. For the backscatter communication considered in this work, the achievable secrecy rate is given by [42] C0S = (C0R − C0E )+ + = log(1 + γR ) − log(1 + γE ) (6) where a+ max (a, 0). Here, C0R is the capacity of the tagreader channel and C0E is the capacity of the tag-eavesdropper channel. To enable secure communication at the secrecy rate, a properly designed wiretap code is required. From the information-theoretic point of view, different wiretap codes may result in different secrecy levels, e.g., either weak secrecy or strong secrecy [28], although the secrecy rate expression remains the same. In this work, we do not pursue an informationtheoretic result on the wiretap coding schemes for achieving a specific type of secrecy. Also, note that the system model can be easily extended to the case in which multiple noncolluding eavesdroppers are present. In such a scenario, C0E or equivalently γE in (6) would represent the capacity or SNR of the eavesdropper with the strongest signal reception, whereas SAAD et al.: ON THE PHYSICAL LAYER SECURITY OF BACKSCATTER WIRELESS SYSTEMS the effects of all the other eavesdroppers are irrelevant. Here, we note that, although the case of colluding eavesdroppers is also interesting, in a backscatter system, given the form factor and scale of the system, it is difficult for small, bug-like eavesdroppers to cooperate or perform coordinated attacks, due to cost, size, and computational restrictions. However, the results generated in the subsequent sections can still shed light on this interesting case via some of the parameters pertaining to the eavesdropper’s antenna capabilities. For future work, it is indeed of interest to study how collusive eavesdropping can occur in a backscatter system, while taking into account the physical restrictions on the eavesdroppers and while considering the dynamics of such collusive attacks. From (6), one can see that the condition for having a positive secrecy rate is given by γR > γE . This condition can be easily violated if the eavesdropper has a very sensitive 2 2 σR and receiver as compared to the reader, i.e., σE 2 the tag’s backscattered noise power σT E is small. This is a crucial concern for secrecy, because the receiver noise of the eavesdropper is uncontrollable or even unknown to the reader. In the next section, we propose a low complexity, yet effective noise-injection technique that can significantly improve the physical layer security of backscatter systems and allow secure transmission even when the eavesdropper’s receiver noise is arbitrarily small. We then analyze this proposed approach under different scenarios so as to highlight the potential of using PHY security within a backscatter system. III. T HE P ROPOSED N OISE I NJECTION S CHEME For improving the physical layer security performance, one can explore a key feature of backscatter communication, that is, the CW signal is continuously transmitted by the reader for powering the passive tag during the backscatter communication and, due to the broadcast nature of the wireless channel, this signal is received by the eavesdropper as well. Unfortunately, the conventional CW signal is known to the eavesdropper and hence, does not interfere with the eavesdropper’s reception of the tag’s backscatter signal. Hence, we propose to superimpose a noise-like random signal generated privately, by the reader on the conventional CW signal. This random signal is statistically identical to AWGN so that the eavesdropper cannot distinguish it from its receiver noise. Hence, instead of transmitting x, the reader transmits x + z, where z is the injected noise signal with power Pz . The total transmit power of the reader becomes P = Px +Pz . During the backscatter communication, the received signal at the reader becomes yR = hT R hRT xs + hT R hRT zs + nR + hT R nT , (7) where the first term in the useful signal and the last three terms constitute the combined noise. Note that z in (7) is the noise signal that arrived at the reader after going through the round-trip propagation with unknown delays (due to phase and time shifts) caused by the signal propagation as well as the tag processing. Hence, it is difficult for the reader, which is often a resource-constrained device in RFID systems, to recover the value of z without additional costs, such as channel training and tracking. However, we do note that, if such costs do not constitute a major barrier, then noise cancelation can be done via standard signal processing technique which exploit 3445 the fact that the reader itself generated the noise and thus has prior knowledge of the noise signal z. In addition, as the reader is continuously transmitting to the tag, it can infer the tag-reader channel, based on its knowledge of the reader-tag channel, which are often correlated. Nonetheless, in order to account for the possibility that the reader partially cancels this backscattered noise, we will introduce an attenuation factor κ that reflects how successful the reader is in canceling the backscattered noise. However, in practice, as we will see in the subsequent numerical results, the power needed to transmit z for achieving good secrecy performance is usually much smaller than the power of the conventional CW signal x. Hence, the second term in (7) is usually negligible compared to the first term, which implies that, practically, there is little benefit from detecting the backscattered z signal. Moreover, we note that, in contrast to the reader, the eavesdropper may have difficulty in performing a similar noise attenuation due to two main factors: a) the eavesdropper does not have knowledge of the random noise signal that the reader has generated and b) in a backscatter system, an eavesdropper is often a small device with highly limited computational capabilities which prevent it from having an advanced receiver structure. Given the noise injection described above, the SNR of the backscatter received signal at the reader is given by γR = Px ΓG2RT K 2 d−4 RT −2 , 2 + σ2 G κPz ΓG2RT K 2 d−4 + σ RT R T RT KdRT (8) where 0 ≤ κ ≤ 1 is the noise attenuation factor. The main objective of the proposed noise injection at the reader is to create additional interference at the eavesdropper during the reception of the backscatter signal from the tag. The signal received by the eavesdropper (after removing the conventional CW signal that arrived directly from the reader’s transmission) is hence given by yE = hT E hRT xs+hT E hRT zs+hRE z +nE +hT E nT E , (9) where z is the received backscattered noise signal from the tag while z is the injected noise signal received at the eavesdropper directly from the reader (over the reader-eavesdropper channel), i.e., z and z represent the transmitted noise signals that are received by the eavesdropper at different time instants (hence slightly different notations are used here). Note that the power of the directly received noise z is typically much larger than the power of the backscattered noise z. Neither z nor z is known to the eavesdropper. But, the eavesdropper, if equipped with a directional antenna, can minimize or potentially zero its antenna gain towards the reader, effectively removing the third term in (9) from its received signal. However, in this case, the noise injection would still be beneficial due to the impact of the backscattered noise seen in the second term of (9). The SNR of the received signal at the eavesdropper is given by (10) where GRE represents the combined transmitterreceiver antenna gain of the reader-eavesdropper link, and dRE is the distance between the reader and the tag. Compared with the eavesdropper SNR without noise injection, given in (5), the benefit of noise injection is clear: the reader can now limit the eavesdropper’s SNR by controlling the injected noise power. 3446 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION Pz GRE Kd−2 RE −2 Px ΓGRT GT E K 2 d−2 RT dT E −2 −2 , 2 2 + Pz ΓGRT GT E K 2 d−2 RT dT E + σE + σT E GT E KdT E One can also characterize the secrecy performance of the backscatter channel by deriving the achievable secrecy rate of the proposed noise injection scheme. Unfortunately, the exact secrecy rate expression is difficult to obtain due to the non-Gaussian distribution of the combined noise at the eavesdropper. However, we can still use the derived SNR expressions to obtain an approximation of the secrecy rate that can quantify the overall secrecy of the transmission, given as C S = ≈ (C0R − C0E )+ + log(1 + γR ) − log(1 + γE ) , (11) where γR and γE are given by (8) and (10), respectively. As discussed previously, the receiver noise at the eavesdropper is uncontrollable and unknown, a robust design approach should aim to provide secrecy in the worst-case scenario by assuming 2 σE = σT2 E = 0 (with such a worst-case assumption, secrecy is not achievable without noise injection). Therefore, in the subsequent sections of the paper, we provide the performance analysis and design for the worst-case scenario by assuming no noise at the eavesdropper. IV. C ONDITIONS FOR P OSITIVE S ECRECY R ATE In this section, we investigate the conditions under which positive secrecy rate can be achieved, i.e., C S > 0. In other words, we seek to better understand the conditions under which the transmission of confidential information is possible with perfect secrecy against the eavesdropper. From (11), the condition for positive secrecy rate reduces to γR > γE . Using the SNR expressions given in (8) and (10), with the 2 = σT2 E = 0, this condition is given by assumption of σE 2 dT E > dRE 2 2 GT E dRT σR + KGRT σT2 2 − (1 − κ)ΓGRT KdRT . (12) GRE KGRT Pz From the above condition, we see that noise injection, i.e., Pz > 0, is necessary for achieving positive secrecy rate. We can also clearly see that the relative distance of the eavesdropper, i.e., dT E /dRE is an important factor. If the eavesdropper is located close to the tag but far away from the reader, i.e., dT E /dRE 1, achieving secrecy becomes a difficult task which requires the reader to inject a strong noise signal. Theoretically, a positive secrecy rate is always achievable with noise injection if the reader does not have a limited power budget for noise injection. This is due to the fact that, by increasing the value of Pz , one can always decrease the right hand side of (12) down to or even below zero. In practice, however, the reader’s transmit power is limited (e.g., the maximum transmission power of an RFID reader is typically 30 dBm or 1 Watt [1]). In what follows, we discuss several interesting cases to obtain further insight into when positive secrecy rate can be achieved within various scenarios. (10) 20 minimum required power for noise insertion [dBm] γE = 15 10 5 0 dRT = 4 m dRT = 2 m −5 0.8 0.82 0.84 0.86 0.88 0.9 0.92 noise attenuation factor 0.94 0.96 0.98 Fig. 2. The minimum required power for noise injection Pz according to (13) for a range of noise attenuation factors κ. The reader-tag distance is set to either 2 m (indicated by square markers) or 4 m (indicated by circular markers). The other system parameters are: the carrier frequency fc = 915 MHz, the tag signal power coefficient Γ = 1/3, and the receiver noise power σ2 = −90 dBm. A. Case One: Noise Attenuation Enabled at Reader In this case, we have κ < 1 and the reader is able to attenuate the noise signal that it injected. With such a noise attenuation, a positive secrecy rate is achievable with a finite noise injection power, regardless of the eavesdropper’s location and hardware capability. To see this, we look at the condition for positive secrecy rate given in (12). In order to satisfy this condition regardless of the eavesdropper’s parameters, we require the right hand side of (12) to be nonpositive. This is satisfied when Pz > 2 + d2RT KGRT σT2 d4RT σR , (1 − κ)ΓG2RT K 2 (13) the right hand side of which is finite when κ < 1. Therefore, as long as the reader is able to adjust the power of the injected noise so as to satisfy (13), secure communication is possible irrespective of the location and antenna gains of the eavesdropper. Numerical Example: Here we use a numerical example to illustrate the amount of noise power required to guarantee the existence of secure communication. Consider a backscatter communication system with carrier frequency fc = 915 MHz, the tag signal power coefficient Γ = 1/3, and the AWGN 2 = σT2 = −90 dBm. The combined antenna gain power σR of the reader-tag link is assumed to be one, i.e., GRT = 1. Typical reader-tag distances of dRT = 2 m and dRT = 4 m are assumed [1]. Figure 2 shows the minimum required power for noise injection according to (13) for a range of noise attenuation factors. First, this figure clearly shows that as the attenuation capability of the reader gets weaker, i.e., as κ increases, there is a need for a stronger noise signal so as to maintain positive secrecy. Second, Figure 2 conveys a clear message: even with a very insignificant amount of attenuation, e.g., κ = 0.98, SAAD et al.: ON THE PHYSICAL LAYER SECURITY OF BACKSCATTER WIRELESS SYSTEMS 40 dRT = 4 m d 5 RT minimum required power for noise insertion [dBm] minimum required power for noise insertion [dBm] 10 3447 =2m 0 −5 −10 −15 −20 −25 30 20 10 0 −10 −20 dRT = dRE = 2 m, dTE = 0.02 m −30 d =d = 2 m, d = 0.2 m d =d = 2 m, d =2m RT RT −30 0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08 tag−eavesdropper distance, d [m] 0.09 0.1 TE −40 2 10 3 RE RE TE TE 4 10 10 ratio of eavesdropper antenna gains, G /G TE 5 10 RE Fig. 3. The minimum required power for noise injection Pz according to (14) for a range of tag-eavesdropper distances dT E . The other system parameters are: the carrier frequency fc = 915 MHz, the tag signal power coefficient Γ = 1/3, and the receiver noise power σ2 = −90 dBm. The reader-tag distance is set to either 2 m (indicated by square markers) or 4 m (indicated by circular markers). The reader, the tag, and the eavesdropper are located on a straight line in this order and they are all equipped with omnidirectional antennas. Fig. 4. The minimum required power for noise injection Pz according to (12) versus the eavesdropper’s antenna gain ratio GT E /GRE . The readertag distance and the reader-eavesdropper distance are set to the same fixed value of dRT = dRE = 2 m. The tag-eavesdropper distance is set to three different values: dT E = 0.02 m, dT E = 0.2 m, and dT E = 2 m. The other system parameters are: the carrier frequency fc = 915 MHz, the tag signal power coefficient Γ = 1/3, and the receiver noise power σ2 = −90 dBm. The reader’s and tag’s antenna gains are set to one. we are able to achieve secure communication by injecting a relatively small amount of noise, e.g., Pz = 19.2 dBm for dRT = 4 m or Pz = 7.2 dBm for dRT = 2 m. These power values are lower than the typical transmit power of an RFID reader, and hence are very practical. be located as close as 1 cm away from the tag and we can still achieve a positive secrecy rate. We note that, in this scenario, the worst-case eavesdropper’s location in fact depends on the actual application or scenario being considered. For example, if one can physically prevent any person or device from being closer than a certain distance (say 1 meter) away from the tag, the worst-case location can be defined as this distance. B. Case Two: No Noise Attenuation and Omnidirectional Antennas Case Two can be considered as a baseline case in which the reader does not pursue additional signal processing for noise attenuation (i.e., κ = 1) and all communication terminals are equipped with a single omnidirectional antenna. In this case, the condition for positive secrecy rate reduces to 2 dT E d2 σ 2 + KGRT σT2 > RT R dRE KPz 2 + KGRT σT2 d2RE d2RT σR . (14) or Pz > 2 dT E K For this case, in general, the minimum required noise power depends on the location of the eavesdropper. As the eavesdropper gets closer to the tag, the minimum required noise power increases towards infinity and achieving positive secrecy becomes more challenging. Therefore, it is interesting to study how close the eavesdropper can get to the tag for practical values of the noise power generated by the reader. To this end, we consider the same numerical example as described in Subsection IV-A. For simplicity, we assume that the reader, the tag, and the eavesdropper are located on a straight line in this order, which actually represents a worst-case assumption. Numerical Example: Figure 3 shows the minimum required power for noise injection according to (14) for a range of tag-eavesdropper distances. In Figure 3, we can see that as the tag-eavesdropper distance becomes smaller, a stronger noise signal would be required to achieve positive secrecy. In particular, Figure 3 conveys a very promising potential for the proposed approach: Even with a very small amount of noise injection, e.g., Pz = 5.8 dBm, we allow the eavesdropper to C. Case Three: No Noise Attenuation and Worst-Case Eavesdropper Antenna Gains In this subsection, we consider the scenario in which the eavesdropper is an advanced device that is equipped with a directional antenna with high directivity. In this case, it is possible for the eavesdropper to place a null towards the reader and/or steer its main antenna beam towards the tag. Theoretically, whenever we have either GRE = 0 or GT E → ∞, the condition in (12) is always violated if the reader does not have noise attenuation capabilities. In practice, the values of GRE and GT E are usually finite, but often unknown to the reader. From a secure transmission design point of view, one can assume some worst-case (finite) antenna gains for the eavesdropper and carry out the design accordingly so as to evaluate the potential of noise injection in maintaining positive secrecy. In particular, here, we numerically investigate the minimum required power for noise injection for different values of the eavesdropper’s antenna gains. We consider a setup similar to the numerical example described in Subsection IV-A. For ease of illustration, we assume that the reader-tag and readereavesdropper distances are the same. On the other hand, we vary the tag-eavesdropper distance to include the effect of eavesdropper location. The antenna gains of the reader and tag are assumed to be one. Numerical Example: Figure 4 shows the minimum required power for noise injection according to (12), with κ = 0, for different eavesdropper’s antenna gains. In particular, we have considered a wide range of antenna gains with high 3448 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION directivity. Figure 4 shows that as the eavesdropper’s antenna directivity becomes higher, a larger amount of power is needed for the noise signal. Nonetheless, in Figure 4, we can see that, when the eavesdropper is equipped with an expensive directional antenna with GT E /GRE = 105 , the amount of noise power required depends on how close the eavesdropper is to the tag. For a typical tag-eavesdropper distance of dT E = 2 m, a very small noise power is usually sufficient to guarantee the existence of secure communication at a positive secrecy rate. As the eavesdroppers becomes closer to the tag, higher (but usually practical) noise powers would be required as shown in Figure 4. Figure 4 provides a network designer with the necessary results to investigate which worst-case antenna gains and eavesdropping location parameters must be considered for dimensioning the RFID system and designing the physical layer security scheme. In particular, the designer can first estimate the capability of an advanced eavesdropping device by specifying its worst-case location and antenna gain. Then, the designer can use the derived analytical results to compute the minimum required artificial noise power to thwart the eavesdropping threat. For example in Figure 4, if the worstcase distance between tag and eavesdropper is about 20 cm and the eavesdropper has a highly directional antenna gain with a ratio of around 104 , the required artificial noise power is about 8.5 dBm. In this section, all the numerical results have shown that the tag noise has a negligible effect on the overall secrecy results. This is due to the fact that the backscattered tag noise power received at the reader is much smaller than the reader’s own noise power. Therefore, in the remainder of the paper, we ignore the tag noise for simplicity. Hereinafter, we focus on the more interesting case in which a positive secrecy rate can be made possible with the given reader’s power budget. From the condition for positive secrecy rate given in (12), we know that the noise power Pz cannot be zero, in other words, α should be strictly less than 1. This implies that there must exist an optimal value of α ∈ (0, 1). A. Analytical Solution The power optimization problem can be written as 1 + γR arg max arg max f (α), α 1 + γE α (16) where γR and γE are given in (8) and (10), respectively, 2 with σE = 0 (recall the worst-case assumption on the eavesdropper’s receiver noise). In general, the objective function f (α) may not be concave. Nevertheless, the optimal α can be easily found since the first derivative of f (α) w.r.t. α gives a quadratic equation in α. In particular, by setting the first derivative of f (α) to 0, we obtain the two local extrema as α1 = 1− α2 = 1+ a(a + κ)[a(b − 1) + b − κ] − a(1 − κ) , (17) a(b − 1) + κ(b − κ) a(a + κ)[a(b − 1) + b − κ] + a(1 − κ) , (18) a(b − 1) + κ(b − κ) where a= 2 4 dRT σR , P ΓG2RT K 2 and b=1+ GRE d2RT d2T E . ΓGRT GT E Kd2RE Since b > 1 ≥ κ, it is not difficult to show that α2 > 1 and hence is outside the feasible range. Also, because the optimal α cannot be either 0 or 1, we conclude that α1 gives the optimal ratio of power allocation. V. O PTIMAL P OWER A LLOCATION FOR N OISE I NJECTION In the previous section, we have seen that secure communication at a positive secrecy rate can usually be achieved by inserting a small amount of noise at the reader. In practice, the maximum transmit power of the reader is limited, and hence, this power needs to be allocated between the conventional CW signal and the proposed, injected noise signal. Clearly, the performance, in terms of the secrecy rate, depends heavily on this power allocation. In this section, we consider the problem of optimally allocating the total transmission power at the reader between the conventional CW signal and the injected noise in order to maximize the achievable secrecy rate given in (11). To perform this power allocation, the reader must be able to estimate the reader-tag channel. To do so, two approaches can be followed. On the one hand, the reader can use the backscatter signal to estimate the channel. This can be done either jointly with the signal detection or during an initial training phase with the tag. On the other hand, the reader can use MAC-level handshaking protocols (such as those in [1, Chapter 8]) to estimate this channel. Moreover, the reader and tag in a backscatter system are often located at small distances, which makes it easier to estimate the reader-tag channel. To study the optimal power allocation problem, we define the ratio of power allocated to the conventional CW signal as α ∈ (0, 1]. Hence, we have Px = αP and Pz = (1 − α)P. (15) B. Numerical Results Although the analytical result on the optimal power allocation was derived in a nice closed form in (17), it cannot be easily used to explore the impacts of various system parameters on the power allocation design. In particular, we are interested in how the optimal power allocation changes as the eavesdropper’s location or antenna gain changes. In what follows, we carry out numerical analysis to clearly show the impact of the eavesdropper parameters on the power allocation and on the achievable secrecy rate. Consider a backscatter communication system with carrier frequency fc = 915 MHz, the tag signal power Γ = 1/3, and the receiver noise power σ 2 = −90 dBm. The total transmission power budget of the reader is set to P = 20 dBm. The reader is assumed to have no noise attenuation capability. The antenna gains of the reader and tag are assumed to be one. Impact of the Eavesdropper Location: First, we study the impact of the eavesdropper’s location on the power allocation strategy at the reader. Here, for simplicity, we assume that the reader, the tag, and the eavesdropper are located on a straight line in this order and that they are all equipped with omnidirectional antennas. Figure 5 shows the optimal value of α versus the tageavesdropper distance dT E ranging from 0 to 1 m. The readertag distance is fixed to either 2 m or 4 m. From Figure 5, SAAD et al.: ON THE PHYSICAL LAYER SECURITY OF BACKSCATTER WIRELESS SYSTEMS 1.02 3449 1.05 dRT = dTE = dRE = 2 m 1.01 d optimal ratio of power allocation, α optimal ratio of power allocation, α RT 1 0.99 0.98 0.97 0.96 0.95 0.94 =d TE RE =4m 0.95 0.9 0.85 dRT = 2 m 0.93 0.92 =d 1 dRT = 4 m 0 0.2 0.4 0.6 tag−eavesdropper distance, d TE 0.8 1 [m] 0.8 0 10 1 2 3 4 10 10 10 10 ratio of eavesdropper antenna gains, G /G TE Fig. 5. The optimal value of α versus the tag-eavesdropper distance dT E . The other system parameters are: the carrier frequency fc = 915 MHz, the tag signal power coefficient Γ = 1/3, and the receiver noise power σ2 = −90 dBm. The reader-tag distance is set to either 2 m (indicated by the solid line) or 4 m (indicated by the dashed line). The reader, the tag, and the eavesdropper are located on a straight line in this order and they are all equipped with omnidirectional antennas. The total transmission power budget of the reader P = 20 dBm. 5 10 RE Fig. 7. The optimal value of α versus the eavesdropper’s antenna gain ratio GT E /GRE . The reader-tag distance and the reader-eavesdropper distance and the tag-eavesdropper distance are set to the same fixed value of either dRT = dT E = dRE = 2 m (indicated by the solid line) or dRT = dT E = dRE = 4 m (indicated by the dashed line). The other system parameters are: the carrier frequency fc = 915 MHz, the tag signal power coefficient Γ = 1/3, and the receiver noise power σ2 = −90 dBm. The reader’s and tag’s antenna gains are set to one. The total transmission power budget of the reader P = 20 dBm. achievable secrecy rate, CS [bits per channel use] 9 8 7 6 5 4 3 2 dRT = 2 m 1 dRT = 4 m 0 0 0.2 0.4 0.6 tag−eavesdropper distance, dTE [m] 0.8 1 Fig. 6. The achievable secrecy rate C S with optimal power allocation versus the tag-eavesdropper distance dT E . The other system parameters are: the carrier frequency fc = 915 MHz, the tag signal power coefficient Γ = 1/3, and the receiver noise power σ2 = −90 dBm. The reader-tag distance is set to either 2 m (indicated by the solid line) or 4 m (indicated by the dashed line). The reader, the tag, and the eavesdropper are located on a straight line in this order and they are all equipped with omnidirectional antennas. The total transmission power budget of the reader P = 20 dBm. we can see that the optimal value of α is very close to 1 for nearly all possible values of the tag-eavesdropper distance (including the values of dT E > 1 not shown in the figure for ease of presentation), which implies that only a tiny fraction of power is needed for noise injection in order to achieve the optimal physical layer security performance. Only when the tag-eavesdropper distance approaches 0, does the optimal α starts to drop significantly and quickly approaches 0. Figure 6 shows the secrecy rate C S achieved by using the optimal value of α. Note that under the worst-case assumption σE = 0, secure communication is not possible without noise injection. In Figure 6, we can first see that the achievable secrecy rate strongly depend on the tag-eavesdropper distance. Indeed, as this distance becomes smaller, the secrecy rate performance becomes smaller. Nonetheless, this figure clearly show the benefit of noise injection. In particular, it shows that the system can enjoy good secrecy rate performance even if the eavesdropper is located very close to the tag, e.g., more than 3 bits per channel use is achievable even when the eavesdropper is only 0.1 meters away from the tag. Impact of the Eavesdropper Antenna Gains: Next, we study the impact of the eavesdropper’s antenna gains when it is equipped with a directional antenna with potentially high directivity. By either minimizing the antenna gain towards the reader GRE or maximizing the antenna gain towards the tag GT E , the eavesdropper is able to improve its SNR. From the expression for γE in (10), we can see that (with the assumption of σE = 0) the ratio of the eavesdropper antenna gain, i.e. GT E /GRE , is an important factor. Therefore, we will consider different values of GT E /GRE . For simplicity, the reader-tag distance and the reader-eavesdropper distance and the tageavesdropper distance are set to the same fixed value of either dRT = dT E = dRE = 2 m or dRT = dT E = dRE = 4 m. Figure 7 shows the optimal value of α versus the eavesdropper’s antenna gain ratio GT E /GRE ranging from 1 to 105 . Again, we see that the optimal value of α is very close to 1 for a wide range of practical antenna gains. Only when the gain ratio goes beyond 103 , does the optimal α start to drop, but still remains at a large value even if the gain ratio reaches 105 . This implies that, for most practical antenna gains, a small portion of the power is needed for noise injection. Figure 8 shows the secrecy rate C S achieved by using the optimal value of α. In this figure, we can see that as the ratio of eavesdropper antenna gains increases, the overall secrecy decreases since the eavesdropper is able to cancel out the additional interference over the reader-eavesdropper channel. This decrease has a steeper slope when the eavesdropper is closer to the tag, i.e., for the case in which dRT = dT E = dRE = 2 m. Nonetheless, Figure 8 clearly demonstrates that, using the proposed noise injection approach, the system is still able to guarantee a positive secrecy rate even if the gain ratio reaches a value as large as 105 . 3450 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION R EFERENCES dRT = dTE = dRE = 2 m 9 d RT =d =d TE RE =4m 8 7 6 S achievable secrecy rate, C [bits per channel use] 10 5 4 3 2 1 0 0 10 1 2 3 4 10 10 10 10 ratio of eavesdropper antenna gains, G /G TE 5 10 RE Fig. 8. The achievable secrecy rate C S with optimal power allocation versus the eavesdropper’s antenna gain ratio GT E /GRE . The reader-tag distance and the reader-eavesdropper distance and the tag-eavesdropper distance are set to the same fixed value of either dRT = dT E = dRE = 2 m (indicated by the solid line) or dRT = dT E = dRE = 4 m (indicated by the dashed line). The other system parameters are: the carrier frequency fc = 915 MHz, the tag signal power coefficient Γ = 1/3, and the receiver noise power σ2 = −90 dBm. The reader’s and tag’s antenna gains are set to one. The total transmission power budget of the reader P = 20 dBm. VI. C ONCLUSIONS In this paper, we have presented an analysis of the physical layer security of wireless systems that employ backscatter communication for transmission. First, we have studied the properties and characteristics of physical layer security in a single reader backscatter system. Then, we have proposed to inject a noise signal at the reader for optimizing the overall secrecy rate while exploiting the unique features of the backscatter channel. We have derived the conditions under which positive secrecy is achievable, under a variety of scenarios that reflect the various capabilities of the legitimate nodes and the eavesdropper. Furthermore, we have shown that the use of such added noise can significantly improve the secrecy of backscatter communication, given proper allocation of power between the continuous wave and the injected noise signals. After deriving a closed-form solution for the optimal power allocation problem, we have numerically studied the achievable performance. Our numerical results have provided important insights into the physical layer security performance of backscatter systems while showing that the proposed noise injection approach can significantly assist in maintaining positive secrecy and a reasonable secrecy rate, under various network scenarios. For future work, one interesting aspect is to investigate how to exploit backscatter channel characteristics, such as propagation delays, to generate secret keys from the physical layer of the backscatter. Here, the reader and tag can exploit the differences in the signal’s signature over the tag-reader channel as opposed to the tag-eavesdropper/readereavesdropper channel to generate such a secret key. Other extensions can address a variety of issues such as studying the multi-reader/tag case, designing more efficient, backscatteroriented secrecy achieving codes that are of low complexity, and investigating various elaborate backscatter radio propagation environments. [1] D. M. Dobkin, The RF in RFID: Passive UHF RFID in Practice. Newnes, 2007. [2] S. Roy, V. Jandhyala, J. R. Smith, D. J. Wetherall, B. P. Otis, R. Chakraborty, M. Buettner, D. J. Yeager, Y. C. Ko, and A. P. Sample, “RFID: from supply chains to sensor nets,” Proc. IEEE, vol. 98, no. 9, pp. 1583–1592, Aug. 2010. [3] J. D. Griffin, G. D. Durgina, A. Haldi, and B. Kippelen, “RF tag antenna performance on various materials using radio link budgets,” IEEE Antennas Wireless Propag. Lett., vol. 5, no. 1, pp. 247–250, Dec. 2006. [4] T. Philips, T. Karygiannis, and R. Kuhn, “Security standards for the RFID market,” IEEE Security Privacy, vol. 3, no. 6, pp. 85–89, Nov. 2005. [5] A. O. Bicen and O. B. Akan, “Energy-efficient RF source power control for opportunistic distributed sensing in wireless passive sensor networks,” in Proc. 2012 IEEE Symp. Comput. Commun. [6] A. Blestas, A. G. Dimitriou, and J. N. Sahalos, “Improving backscatter radio tag efficiency,” IEEE Trans. Microwave Theory Techniques, vol. 58, no. 6, pp. 1502–1509, June 2010. [7] J. D. Griffin and G. D. Durgin, “Gains for RF tags using multiple antennas,” IEEE Trans. Antennas Propag., vol. 56, no. 2, pp. 563–570, Feb. 2008. [8] P. Zhang, J. Gummeson, and D. Ganesan, “BLINK: a high throughput link layer for backscatter communication,” in Proc. 2012 International Conf. Mobile Syst., Applications Services. [9] H. Yoshida, S. Sekine, Y. Fujita, T. Suzuki, and S. Otaka, “A 950-MHz rectifier circuit for sensor network tags with 10-m distance,” IEEE J. Solid State Circuits, vol. 41, no. 1, pp. 35–41, Jan. 2006. [10] D. Arnitz, U. Muehlmann, and K. Witrisal, “Wideband characterization of backscatter channels: derivations and theoretical background,” IEEE Trans. Antennas Propag., vol. 60, no. 1, pp. 257–266, Jan. 2012. [11] L. Kang, K. Wu, J. Zhang, H. Tan, and L. Ni, “DDC: a novel scheme to directly decode the collisions in UHF RFID systems,” IEEE Trans. Parallel Distributed Comput., vol. 23, no. 2, pp. 263–270, Dec. 2011. [12] A. Juels, “RFID security and privacy: a research survey,” IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 381–394, Feb. 2006. [13] ——, “Minimalist cryptography for low-cost RFID tags,” in Proc. 2004 Int. Conf. Security Commun. Netw. [14] E. Vahedi, R. K. Ward, and I. Blake, “Security analysis and complexity comparison of some recent lightweight RFID protocols,” in Proc. 2011 Int. Conf. Computational Intelligence Security Inf. Syst. [15] S. Piramuthu, “SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity,” IEEE Trans. Dependable Secure Comput., vol. 4, no. 4, pp. 337–340, Dec. 2007. [16] P. H. Cole and D. C. Ranasinghe, Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting. Springer, 2007. [17] B. Calmels, S. Canard, M. Girault, and H. Sibert, “Low-cost cryptography for privacy in RFID systems,” in Proc. 2006 IFIP Int. Conf. Smart Card Research Advanced Applications. [18] Y. Cui, K. Kobara, K. Matsuura, and H. Imai, “Lightweight asymmetric privacypreserving authentication protocols secure against active attack,” in Proc. 2007 Int. Workshop Pervasive Comput. Commun. Security. [19] P. Peris-Lopez, J. C. Hernandez-Castro, J. Estevez-Tapiador, and A. Ribagorda, “M2AP: a minimalist mutual-authentication protocol for lowcost RFID tags,” in Proc. 2006 Int. Conf. Ubiquitous Intelligence Comput. [20] B. Defend, K. Fu, and A. Juels, “Cryptanalysis of two lightweight RFID authentication schemes,” in Proc. 2007 Int. Workshop Pervasive Comput. Commun. Security. [21] T. Li and G. Wang, “Security analysis of two ultra-lightweight RFID authentication protocols,” in Proc. 2007 IFIP SEC. [22] H.-J. Chae, D. J. Yeager, J. R. Smith, and K. Fu, “Maximalist cryptography and computation on the WISP UHF RFID tag,” in Proc. 2007 RFID Security. [23] EPCGlobal, “EPC radio-frequency identity protocols class-1 generation2 UHF RFID protocol for communications,” Tech. Rep. Available: http: //www.epcglobalinc.org [24] A. D. Wyner, “The wire-tap channel,” Bell System Tech. J., vol. 54, no. 8, pp. 1355–1387, 1975. [25] Y. Liang, G. Kramer, H. V. Poor, and S. Shamai, “Compound wire-tap channels,” EURASIP J. Wireless Commun. Netw., vol. 2009, Article ID 142374, 12 pages, 2009. [26] P. K. Gopala, L. Lai, and H. El Gamal, “On the secrecy capacity of fading channels,” IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687– 4698, Sept. 2008. [27] Z. Li, W. Trappe, and R. Yates, “Secret communication via multiantenna transmission,” in Proc. 2007 Conf. Inf. Sciences Syst. SAAD et al.: ON THE PHYSICAL LAYER SECURITY OF BACKSCATTER WIRELESS SYSTEMS [28] M. Bloch and J. Barros, Physical-Layer Security: From Information Theory to Security Engineering. Cambridge University Press, 2011. [29] Y. Liang, L. Lai, S. Shamai, and H. V. Poor, “A broadcast approach for fading wiretap channels,” IEEE Trans. Inf. Theory, vol. 60, no. 2, pp. 842–858, Feb. 2014. [30] L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Improving wireless physical layer security via cooperating relays,” IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875–1888, Mar. 2010. [31] Z. Han, N. Marina, M. Debbah, and A. Hjørungnes, “Physical layer security game: interaction between source, eavesdropper and friendly jammer,” EURASIP J. Wireless Commun. Netw., Special Issue on Wireless Physical Layer Security, vol. 2009, June 2009. [32] R. Zhang, L. Song, Z. Han, and B. Jiao, “Physical layer security for two way relay communications with untrusted relay and friendly jammers,” IEEE Trans. Veh. Technol., to appear, 2012. [33] S. Gollakota and D. Katabi, “Physical layer wireless security made fast and channel independent,” in Proc. 2011 IEEE INFOCOM. [34] Y. Liang, H. V. Poor, and L. Ying, “Secrecy throughput of MANETs with active and passive attacks,” IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6692–6702, Oct. 2011. [35] S. Vasudevan, D. Goeckel, and D. Towsley, “Security-capacity trade-off in large wireless networks using keyless secrecy,” in Proc. 2010 ACM Int. Symp. Mobile Ad Hoc Netw. Comput., pp. 21–30. [36] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180–2189, June 2008. [37] N. Romero-Zurita, M. Ghogho, and D. McLernon, “Outage probability based power distribution between data and artificial noise for physical layer security,” IEEE Signal Process. Lett., vol. 19, no. 2, pp. 71–74, Feb. 2012. [38] S. Gerbracht, C. Scheunert, and E. Jorswieck, “Secrecy outage in MISO systems with partial channel information,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 704–716, Apr. 2012. [39] X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, “Interference assisted secret communication,” IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 3153–3167, May 2011. [40] G. Zheng, L.-C. Choo, and K.-K. Wong, “Optimal cooperative jamming to enhance physical layer security using relays,” IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317–1322, Mar. 2011. [41] C. M. Angerer, R. Langwieser, and M. Rupp, “RFID reader receivers for physical layer collision recovery,” IEEE Trans. Commun., vol. 58, no. 12, pp. 3526–3537, Dec. 2010. [42] M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “Wireless information-theoretic security,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515–2534, June 2008. [43] W. Saad, Z. Han, and H. V. Poor, “On the physical layer security of backscatter RFID systems,” in Proc. 2012 Int. Symp. Wireless Commun. Syst. Walid Saad (S’08–M’10) received his B.E. degree in computer and communications engineering from Lebanese University in 2004, his M.E. in Computer and Communications Engineering from the American University of Beirut (AUB), Lebanon, in 2007, and his Ph.D. degree from the University of Oslo, Norway, in 2010. Currently, he is an Assistant Professor at the Electrical and Computer Engineering Department at the University of Miami, Coral Gables, FL. Prior to joining UM, he has held several research positions at institutions such as Princeton University and the University of Illinois at Urbana-Champaign. His research interests include wireless and small cell networks, game theory, network science, cognitive radio, wireless security, smart grids, and self-organizing networks. He has co-authored one book and over 85 international conference and journal publications in these areas. In 2013, Dr. Saad received the NSF CAREER award for his research on self-organizing wireless systems. He is an Associate Editor for the IEEE T RANSACTIONS ON C OMMUNICATIONS and the IEEE C OMMUNICATION S URVEYS & T UTORIALS . He was the author/co-author of the papers that received the Best Paper Award at the 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), 3451 in June 2009, at the 5th International Conference on InternetMonitoring and Protection (ICIMP) in May 2010, and at IEEE WCNC in 2012. Dr. Saad is a recipient of several awards from the University of Miami that include the Provost Research Award (2011 and 2013) and the Eliahu I. Jury Award for early career researcher in 2013. Xiagyun Zhou (S-08–M’11) is a Lecturer at the Australian National University (ANU), Australia. He received the B.E. (hons.) degree in electronics and telecommunications engineering and the Ph.D. degree in telecommunications engineering from the ANU in 2007 and 2010, respectively. From June 2010 to June 2011, he worked as a postdoctoral fellow at UNIK - University Graduate Center, University of Oslo, Norway. His research interests are in the fields of communication theory and wireless networks. Dr. Zhou serves on the editorial board of the following journals: IEEE C OMMUNICATIONS L ETTERS , Security and Communication Networks (Wiley), and Ad Hoc & Sensor Wireless Networks. He has also served as a TPC member of major IEEE conferences. Currently, he is the Chair of the ACT Chapter of the IEEE Communications Society and Signal Processing Society. He is a recipient of the Best Paper Award at the 2011 IEEE International Conference on Communications. Zhu Han (S’01–M’04–SM’09–F’14) received the B.S. degree in electronic engineering from Tsinghua University, in 1997, and the M.S. and Ph.D. degrees in electrical engineering from the University of Maryland, College Park, in 1999 and 2003, respectively. From 2000 to 2002, he was an R&D Engineer of JDSU, Germantown, Maryland. From 2003 to 2006, he was a Research Associate at the University of Maryland. From 2006 to 2008, he was an assistant professor in Boise State University, Idaho. Currently, he is an Associate Professor in Electrical and Computer Engineering Department at the University of Houston, Texas. His research interests include wireless resource allocation and management, wireless communications and networking, game theory, wireless multimedia, security, and smart grid communication. Dr. Han is an Associate Editor of IEEE T RANSACTIONS ON W IRELESS C OMMUNICATIONS since 2010. Dr. Han is the winner of IEEE Fred W. Ellersick Prize 2011. Dr. Han is an NSF CAREER award recipient 2010. H. Vincent Poor Poor (S’72–M’77–SM’82–F’87) received the Ph.D. degree in EECS from Princeton University in 1977. From 1977 until 1990, he was on the faculty of the University of Illinois at UrbanaChampaign. Since 1990 he has been on the faculty at Princeton, where he is the Michael Henry Strater University Professor of Electrical Engineering and Dean of the School of Engineering and Applied Science. Dr. Poor’s research interests are in the areas of information theory, statistical signal processing and stochastic analysis, and their applications in wireless networks and related fields including social networks and smart grid. Among his publications in these areas are the recent books Principles of Cognitive Radio (Cambridge University Press, 2013) and Mechanisms and Games for Dynamic Spectrum Allocation (Cambridge University Press, 2014). Dr. Poor is a member of the National Academy of Engineering, the National Academy of Sciences, and Academia Europaea, and is a fellow of the American Academy of Arts and Sciences, the Royal Academy of Engineering (U.K.), and the Royal Society of Edinburgh. He received the Marconi and Armstrong Awards of the IEEE Communications Society in 2007 and 2009, respectively. Recent recognition of his work includes the 2010 IET Ambrose Fleming Medal for Achievement in Communications, the 2011 IEEE Eric E. Sumner Award, and honorary doctorates from Aalborg University, the Hong Kong University of Science and Technology, and the University of Edinburgh.
© Copyright 2025 Paperzz